NEWS
Before adopting Artificial Intelligence, CISOs must answer the following questions

The use of artificial intelligence (AI) is hugely prevalent in almost all aspects of our day-to-day lives including security. Looking at the security landscape, supervised machine learning (ML) is well established in threat detection but unsupervised ML and deep learning are increasingly popular tools for post breach anomaly detection. By Jeremy D’Hoinne, Research Vice President, Gartner.

Read More
NEWS
Outside the four walls of the data centre

Almost four in 10 people in the EU began working remotely in the first few months of 2020, according to a study carried out by Eurofund. This is a seismic shift considering that the amount of people who regularly worked remotely before the pandemic took hold ranged from as low as 6% to as high as 23%, depending on country. By Michael Cade, Senior Global Technologist, Veeam.

Read More
NEWS
It is time to stop trusting and start protecting

By James Taylor, Strategic Development Manager for Cyber Security, Nuvias.

Read More
NEWS
Protect the key or don’t bother encrypting your data

By Peter Carlisle, Vice President, nCipher Security.

Read More
NEWS
The C-Suite are exposing themselves to phishing attacks

By David Critchley, Regional Director UK & I, MobileIron.

Read More
NEWS
Five factors that form how Security Awareness training programs are developing

By Elena Molchanova, Head of Security Awareness Marketing, Kaspersky.

Read More
NEWS
A new approach to cloud native application security

By Dror Davidoff, Co-Founder and CEO, Aqua Security.

Read More
NEWS
What’s next for cybersecurity?

A recent HP panel discussion sought to provide some answers to this question – topics covered including: the ethics of paying ransoms, to politicised destructive attacks and the new ‘anchors’ of compute infrastructure in a remote world. Here we look at some of the key discussion points:

Read More
NEWS
It’s all about edge, APIs and 5G

Pascal Geenens, director of threat intelligence, Radware, offers some fascinating insights into some of the security issues thrown up by the digital world.

Read More
NEWS
The attack that changed the world of cyber security for ever

You may be surprised to learn that one of the first computer viruses to bring millions of computers to a halt was borne out of a student’s bedroom in the Philippines, just over 20 years ago. Mark Nutt, EVP EMEA at Veritas, is taking a look back at when the computer virus was unleashed and the ripples it sent forward in time. Not only did “LoveBug” infect over 45 million devices, but it became a catalyst for the multi-billion-dollar ransomware crime industry that we know today.

Read More

Videos

Jurg van Vliet, CEO of Aknostic, discusses the emergence of regional clouds within Europe, based on open source software and Kubernetes in particular, as an alternative to the large public cloud offerings. Trial projects are in progress to demonstrate the economic, environmental and societal benefits that such regional clouds can provide.
Franck Morales, Vice President, Evolution Platform, Orange Business, discusses the importance of finding the right partner as a system integrator for digital transformation – outlining the knowledge and experience they provide to the end user, explaining why a successful digital transformation project starts with infrastructure, and shares some real-world examples of how the company has helped its customers with SASE and other technology solutions.
In this video we talk toArcadis at Data Centre Transformation 2023 and find out what keeps their Project Director James Rix up at night.
Simon Marr, Managing Director of Marr Contracting, discusses the drawbacks of traditional data centre construction methods, explaining how an innovative approach to cranage usage brings with it significant project benefits, including significantly reduced build times, lower project costs, improved quality and safety, not to mention greener construction. www.marr.com.au

News

With application ownership and governance issues often put to the side in a rush to introduce new infrastructure, 53% of CIOs (Chief Information Officers) and ITDs (IT Directors) are unable to confirm exactly how many applications were running on their estate.
After a 60-year hiatus, the AMF1 Team are back on the track and using NetApp technology to increase performance, improve reliability, and chase the championship title.
ThreatQ Platform and ThreatQ Investigations allow Thales to pioneer market-leading personalised threat intelligence services.
Modern cloud solutions are supporting delivery of these use cases, while also helping financial organisations improve regulatory compliance, reduce costs, drive business outcomes, and cut down on technical debt.